Publication:
Forensic Analysis on False Data Injection Attack on IoT Environment

dc.citedby1
dc.contributor.authorNizam S.A.S.en_US
dc.contributor.authorIbrahim Z.-A.en_US
dc.contributor.authorRahim F.A.en_US
dc.contributor.authorFadzil H.S.en_US
dc.contributor.authorMohd Abdullah H.I.en_US
dc.contributor.authorMustaffa M.Z.en_US
dc.contributor.authorid57350466100en_US
dc.contributor.authorid57203863738en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid57350813500en_US
dc.contributor.authorid57220806281en_US
dc.contributor.authorid57220805312en_US
dc.date.accessioned2023-05-29T09:10:57Z
dc.date.available2023-05-29T09:10:57Z
dc.date.issued2021
dc.descriptionAdvanced metering infrastructures; Digital forensics; Electric power system security; Electric power transmission networks; Network security; Water supply; Water supply systems; Cyber attackers; Electric power grids; Evidence collection; False data injection attacks; Forensic analysis; Forensic investigation; Internet of thing (IOT); Metering systems; Internet of thingsen_US
dc.description.abstractFalse Data Injection Attack (FDIA) is an attack that could compromise Advanced Metering Infrastructure (AMI) devices where an attacker may mislead real power consumption by falsifying meter usage from end-users smart meters. Due to the rapid development of the Internet, cyber attackers are keen on exploiting domains such as finance, metering system, defense, healthcare, governance, etc. Securing IoT networks such as the electric power grid or water supply systems has emerged as a national and global priority because of many vulnerabilities found in this area and the impact of the attack through the internet of things (IoT) components. In this modern era, it is a compulsion for better awareness and improved methods to counter such attacks in these domains. This paper aims to study the impact of FDIA in AMI by performing data analysis from network traffic logs to identify digital forensic traces. An AMI testbed was designed and developed to produce the FDIA logs. Experimental results show that forensic traces can be found from the evidence logs collected through forensic analysis are sufficient to confirm the attack. Moreover, this study has produced a table of attributes for evidence collection when performing forensic investigation on FDIA in the AMI environment. � 2021en_US
dc.description.natureFinalen_US
dc.identifier.doi10.14569/IJACSA.2021.0121029
dc.identifier.epage271
dc.identifier.issue10
dc.identifier.scopus2-s2.0-85119665887
dc.identifier.spage265
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85119665887&doi=10.14569%2fIJACSA.2021.0121029&partnerID=40&md5=8345a7ae4f7c7bf79f8186c329eb8bf4
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/26475
dc.identifier.volume12
dc.publisherScience and Information Organizationen_US
dc.relation.ispartofAll Open Access, Gold
dc.sourceScopus
dc.sourcetitleInternational Journal of Advanced Computer Science and Applications
dc.titleForensic Analysis on False Data Injection Attack on IoT Environmenten_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections